【#文档大全网# 导语】以下是®文档大全网的小编为您整理的《网络技术专业毕业论文--TCPIP协议脆弱性分析》,欢迎阅读!
摘 要
随着生活节奏的加快,计算机网络技术也在高速发展,Internet 作为已经成为我们生
活中不可或缺的一部分。Internet 安全问题也越来越受人们关注,TCP/IP作为一个事实上的工业标准,是Internet使用的标准协议集,是目前Internet 网络的基础,也是网络环境中广泛采用的互联网协议。然而,这样重要的一个协议族在其制订之初,没有考虑安全因素,因此他本身无安全可言。网络安全问题越来越受到国家和社会的关注,网络安全已经成为计算机通信领域的重要研究方向之一。
这篇论文从研究TCP/IP协议的脆弱性入手来研究TCP/IP协议的安全问题,对TCP/IP的进行了对TCP/IP进行概述,模型的发展、如何由OSI模型发展到了TCP/IP模型,并对TCP/IP模型的优点、体系结构、数据报结构进行了描述;再对TCP/IP进行了详解,对常见协议按照使用被使用关系、所属公司、等进行分类,并对主要协议描述,并对各个层次协议的脆弱性问题进行了比较深入的讨论。在前面分析的基础上画出TCP/IP安全图。然后用现在最为流行的ARPSpoof工具从实验的角度上来分析ARP协议的脆弱性,证明ARP协议的脆弱性确实存在。
关键词: TCP / IP协议;网络安全;脆弱性; TCP/IP安全图;
I
ABSTRACT
With the development of computer network technology, TCP / IP as a de facto industry standard, is the set of Internet standard protocol used is based on the current Internet network is widely used in the network environment of the Internet protocol. However, a protocol family such an important beginning in the formulation, there is no security in mind, so no security to speak of his own. Network security is increasingly concerned by the state and society, network security has become an important research field of computer communication directions. This paper from the study TCP / IP protocol to start to study the vulnerability of TCP / IP protocol security problem, TCP / IP, was on the TCP / IP overview, model development, and how the development of the OSI model to the TCP / IP model, and TCP / IP model advantages, architecture, data reported structure described; then on TCP / IP Detailed conducted on the common protocol to be used in accordance with relations, the companies, such as the classification of the main protocol description, and the vulnerability of all levels of protocol issues more in-depth discussion. Based on the analysis in the previous draw TCP / IP security plans. Then now the most popular tools from the experimental point of view ARPSpoof up analysis of the vulnerability of ARP protocol to prove the vulnerability of ARP protocol does exist.
Keywords: TCP / IP protocol; network security; vulnerability; TCP / IP security plans
II
目 录
摘 要 ........................................................................................................................ I ABSTRACT ..............................................................................................................II 目 录 ..................................................................................................................... III 1 引言 ....................................................................................................................... 5 1.1选题的背景、目的和意义 ................................................................................. 5 1.2主要工作 ............................................................................................................. 6 1.3本文的组织与结构 ............................................................................................. 6 2 TCP/IP概述 ........................................................................................................... 7 2.1 开放式通信模型简介 ........................................................................................ 7 2.1.1 开放式网络的发展 ......................................................................................... 7 2.1.2 OSI参考模型 .................................................................................................. 8 2.2 TCP/IP参考模型 .............................................................................................. 10 2.2.1 TCP/IP的优点 ............................................................................................... 11 2.2.3 TCP/IP的数据报结构 ................................................................................... 12 2.2.4 TCP/IP和INTERNET结合 ......................................................................... 13 3 TCP/IP协议详解 ................................................................................................. 13 3.1 TCP/IP协议 ...................................................................................................... 13 3.2 解剖TCP/IP模型 ............................................................................................ 13 3.3 TCP/IP协议族模型分层详细描述 .................................................................. 14 3.3.1 应用层协议 ................................................................................................... 14 3.3.2 传输层协议 ................................................................................................... 18 3.3.3 网络层协议 ................................................................................................... 18 3.3.4网络接口层协议 ............................................................................................ 20 4 TCP/IP协议脆弱性分析 ..................................................................................... 20 4.1 TCP/IP各层协议的脆弱性分析 ...................................................................... 20 4.1.1 应用层协议脆弱性分析-RADIUS协议 ..................................................... 20 4.1.2传输层协议脆弱性分析-TCP协议 .............................................................. 24 4.1.3网络层协议脆弱性分析-IP协议 .................................................................. 26 4.1.4 网络接口层协议脆弱性分析-ARP协议..................................................... 29 5 实验-ARP协议脆弱性验证 ............................................................................... 29 5.1实验原理 ........................................................................................................... 30 5.2实验目的 ........................................................................................................... 30 5.3实验设备 ........................................................................................................... 30 5.4实验步骤 ........................................................................................................... 30 5.5实验结论 ........................................................................................................... 35 6 结论 ..................................................................................................................... 35 6.1 TCP/IP存在脆弱性 .......................................................................................... 35
III
本文来源:https://www.wddqxz.cn/bfab13e2670e52ea551810a6f524ccbff021cab9.html